xref: /aosp_15_r20/external/selinux/libselinux/utils/compute_av.c (revision 2d543d20722ada2425b5bdab9d0d1d29470e7bba)
1 #include <unistd.h>
2 #include <sys/types.h>
3 #include <stdio.h>
4 #include <stdlib.h>
5 #include <string.h>
6 #include <errno.h>
7 #include <selinux/selinux.h>
8 
main(int argc,char ** argv)9 int main(int argc, char **argv)
10 {
11 	struct av_decision avd;
12 	security_class_t tclass;
13 	int ret;
14 
15 	if (argc != 4) {
16 		fprintf(stderr, "usage:  %s scontext tcontext tclass\n",
17 			argv[0]);
18 		exit(1);
19 	}
20 
21 	if (security_check_context(argv[1])) {
22 		fprintf(stderr, "%s:  invalid source context '%s'\n", argv[0], argv[1]);
23 		exit(4);
24 	}
25 
26 	if (security_check_context(argv[2])) {
27 		fprintf(stderr, "%s:  invalid target context '%s'\n", argv[0], argv[2]);
28 		exit(5);
29 	}
30 
31 	tclass = string_to_security_class(argv[3]);
32 	if (!tclass) {
33 		fprintf(stderr, "%s:  invalid class '%s'\n", argv[0], argv[3]);
34 		exit(2);
35 	}
36 
37 	ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd);
38 	if (ret < 0) {
39 		fprintf(stderr, "%s:  security_compute_av failed:  %s\n", argv[0], strerror(errno));
40 		exit(3);
41 	}
42 
43 	printf("allowed=");
44 	print_access_vector(tclass, avd.allowed);
45 	printf("\n");
46 
47 	if (~avd.decided) {
48 		printf("decided=");
49 		print_access_vector(tclass, avd.decided);
50 		printf("\n");
51 
52 		printf("undecided=");
53 		print_access_vector(tclass, ~avd.decided);
54 		printf("\n");
55 	}
56 
57 	if (avd.auditallow) {
58 		printf("auditallow=");
59 		print_access_vector(tclass, avd.auditallow);
60 		printf("\n");
61 	}
62 
63 	if (~avd.auditdeny) {
64 		printf("auditdeny=");
65 		print_access_vector(tclass, avd.auditdeny);
66 		printf("\n");
67 
68 		printf("dontaudit=");
69 		print_access_vector(tclass, ~avd.auditdeny);
70 		printf("\n");
71 	}
72 
73 	exit(EXIT_SUCCESS);
74 }
75